WO2009156263A1 - Method of redundant data storage - Google Patents
Method of redundant data storage Download PDFInfo
- Publication number
- WO2009156263A1 WO2009156263A1 PCT/EP2009/057043 EP2009057043W WO2009156263A1 WO 2009156263 A1 WO2009156263 A1 WO 2009156263A1 EP 2009057043 W EP2009057043 W EP 2009057043W WO 2009156263 A1 WO2009156263 A1 WO 2009156263A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- node
- peer
- nodes
- physical hardware
- runs
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2094—Redundant storage or storage space
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1044—Group management mechanisms
- H04L67/1046—Joining mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1044—Group management mechanisms
- H04L67/1048—Departure or maintenance mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
- H04L67/1065—Discovery involving distributed pre-established resource-based relationships among peers, e.g. based on distributed hash tables [DHT]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
Definitions
- the present invention relates to a method of redundant data storage in a peer- to-peer overlay network, and a network node and a computer program product to execute said method.
- VoIP e.g., Skype
- eMule Voice over Internet Protocol
- VoIP Voice over Internet Protocol
- the P2P network consists of nodes acting as peers, i.e., both as clients and as servers of the network.
- node and “peer” are used interchangeably.
- Each node of the network maintains one or more logical links to other nodes that are established with respect to an overlay algorithm and used for message transmission.
- DHT Distributed Hash Table
- Some systems use hybrid architectures with unstructured groups of peers, and these groups are the structured in a larger topology (e.g. Skype).
- Advanced P2P networks implement a distributed database (DHT) that requires replication mechanisms to ensure that the stored data persists also in case of an ungraceful leave of a node from the network.
- DHT distributed database
- P2P networks are totally decentralised. Peers participating in the overlay may leave the network ungracefully and at random time. Redundant storage by data replication on several nodes guarantees that the data is still available in the network, even after the peer that was responsible for the data has quit the overlay.
- the redundancy mechanisms are based on overlay specifics, e.g. neighbourhood relationships between peers closely together in the peer identifier space. High availability of the data is achieved by publishing the data on one node that is responsible for the data entry and on one or more nodes that keep a backup entry. Higher availability is achieved by storing multiple replicas on multiple neighbour nodes.
- each peer node replicates the set of resources for which it is responsible on the neighbouring peer nodes in terms of peer ID.
- DHTs usually store key/value pairs of data whereas the keys are mapped to the ID space of the nodes.
- Chord each node is responsible to store those keys that are equal or smaller than its own ID and greater than its predecessor ID.
- Fig. 1 a shows a prior art structured P2P overlay network N comprising a plurality of nodes 0, 20, 50, 87, 112, 140, 179, 200, 211 , 223, 240.
- Fig. 1 a illustrates a Chord ring N.
- the reference signs 0, 20, 50, 87, 112, 140, 179, 200, 211 , 223, 240 of the nodes are meant to represent also the node IDs of the nodes 0, 20, 50, 87, 112, 140, 179, 200, 211 , 223, 240.
- Chord the nodes maintain direct connections to their predecessor and successor nodes, which results in a ring topology.
- the node with the node ID 211 is responsible for all keys in the interval ⁇ 201 , 202, ..., 211 ⁇ .
- the key/value pair with the key ID 203 is thus stored on the node 211 , and the replicas of the data of node 211 are stored on the successor node 223, as indicated in Fig. 1a. If the node 211 leaves the network N, as shown in Fig. 1 b, the node 223 becomes responsible also for the ID space of node 211 , including the key 203. Thus the data of node 211 is maintained in the network N.
- PDA Personal Digital Assistant
- a user of the P2P communication device is entitled to freely choose the modifiable part but not able to change the distinct, non-modifiable part which is definitely allocated to the user.
- This is to ensure that two or more P2P communication devices associated with a single user are located close to each other in a P2P network.
- IP Internet Protocol
- a disadvantage of this neighbouring location is that it is very likely that the P2P communication devices are connected to the P2P network via the same network entity, e.g., a router. In case this router fails, all the P2P communication devices are disconnected at the same time.
- a first object of the present invention is achieved by a method of redundant data storage in a peer-to-peer overlay network comprising a plurality of nodes, the method comprising the steps of identifying a physical hardware on which a first node of said plurality of nodes runs, determining at least one second node of said plurality of nodes which runs on a different physical hardware than the first node, and storing a replica of data for which the first node is responsible on the at least one second node in addition to or instead of storing a replica of the data on a next logical node of the first node, whereby said next logical node is a node of the plurality of nodes neighbouring the first node with regard to a topology structure of the peer-to-peer overlay network.
- a second object of the present invention is achieved by a first node of a peer-to-peer network comprising a plurality of nodes, whereby the node comprises a control unit adapted to identify a physical hardware on which the first node runs, determine at least one second node of said plurality of nodes which runs on a different physical hardware than the first node, and initiate the storage of a replica of data for which the first node is responsible on the at least one second node in addition to or instead of storing a replica of the data on a next logical node of the first node, whereby said next logical node is a node of the plurality of nodes neighbouring the first node with regard to a topology structure of the peer-to-peer overlay network.
- a third object of the present invention is achieved by a computer program product for redundant data storage in a peer- to-peer overlay network comprising a plurality of nodes, whereby the computer program product, when executed by a node of said plurality of nodes, performs the steps of identifying a physical hardware on which the first node runs, determining at least one second node of said plurality of nodes which runs on a different physical hardware than the first node, and initiating the storage of a replica of data for which the first node is responsible on the at least one second node in addition to or instead of storing a replica of the data on a next logical node of the first node, whereby said next logical node is a node of the plurality of nodes neighbouring the first node with regard to a topology structure of the peer-to-peer overlay network.
- Embodiments of the invention solve this problem encountered in the prior art.
- Embodiments of the invention introduce a redundant data storage algorithm which is based on the overlay topology specifics but at the same time respects the underlying physical hardware of the P2P overlay network.
- Embodiments of the invention present a redundant data storage system which identifies the physical hardware on which one or more of the network nodes are running and considers this information about the physical hardware for a suitable redundant data storage.
- Embodiments of the invention provide a secure way of redundant data storage.
- data replication is a strategy to prevent data loss in case of a node failure
- the replication according to an embodiment of the invention does not take place on the same physical node. This is not considered by prior art DHT algorithms.
- nodes which are neighbours with respect to their logical ID are hosted on the same physical node (e.g. in virtualisation environments, e.g. VMware, Xen).
- virtualisation environments e.g. VMware, Xen
- An embodiment of the invention avoids this risk by means of a redundant data storage that considers the physical hardware of a node.
- embodiments of the invention are especially helpful in small deployments where the probability that neighbour nodes are hosted on the same physical machine is increased.
- Embodiments of the invention avoid loss of data due to redundant data storage by means of a mapping of the physical location and the overlay node ID.
- Embodiments of the invention increase the availability of stored data. Embodiments of the invention provide that information about the actual hardware is included in the replication strategy.
- the new replication strategy according to embodiments of the invention can easily be included in known algorithms for redundant data storage.
- a node which becomes responsible for a key in case of a hardware failure is responsible for the replica.
- Embodiments of the invention support different redundancy levels of replication. And, an assignment of node IDs based on hardware specifics as presented by embodiments of the invention reduces the risk of data loss in case of hardware failures.
- embodiments of the invention provide a solution that considers virtualisation solutions on top of a distributed physical hardware infrastructure for the overlay topology creation and redundant data storage in a P2P network.
- this invention describes an improvement for a fundamental technology that can be beneficially used in distributed environments such as server clusters or pure P2P telephony systems.
- a node ID for the joining node is selected so that a pre-defined number of other nodes are located with regard to the topology structure of the peer-to-peer overlay network between the joining node and the first node.
- the join procedure known in the prior art is modified so that a maximum distance between peers which are running on the same physical hardware is achieved.
- the neighbourhood of peers in the overlay is determined by the peer ID.
- the peer ID is assigned by an enrolment server that has information about the cluster topology. This enrolment server, which preferably is a central server, assigns peer IDs in a way that newly joining peers do not become neighbours with peers that are on the same hardware as the newly joining peer.
- a peer which is newly joining the P2P network chooses its ID on its own, e.g. randomly.
- the admitting peer might decide to redirect the joining peer if the hardware of the joining peer is in conflict with a peer in the neighbourhood.
- the joining peer then chooses a different peer ID and tries to join the overlay elsewhere.
- the joining node is redirected by an admitting node to try to join the peer-to-peer overlay network at another location with regard to the topology structure of the peer-to-peer overlay network.
- the joining node is admitted by the same or another admitting node not before the pre-defined number of other nodes are located with regard to the topology structure of the peer-to-peer overlay network between the joining node and the first node.
- the first node detects information about its own hardware and about hardware of other nodes of the network.
- the goal of this detection is to find out which nodes of the plurality of network nodes are running on a same physical hardware.
- said physical hardware on which the first node runs is determined by retrieving information from a platform of the first node.
- said retrieval is performed by the first node.
- said at least one second node which runs on the same physical hardware as the first node is determined by retrieving information from a platform of the at least one second node.
- said retrieval is performed by the first node.
- MAC Media Access Control
- the MAC address usually is a relative secure way to determine a physical host, however this might not be the case if hardware virtualisation technology is used.
- Embodiments of the invention modify the replication method executed by the Chord peers and thus is able to improve the availability of data in case of physical node failures.
- Embodiments of the invention associate each peer node to a hardware identifier, e.g., a CPU ID, a MAC address, etc. which identifies the hardware platform hosting the peer node.
- the peer node uses the hardware identifiers to replicate the set of resources for which it is responsible on at least one peer node running on a different hardware platform, preferably the closest successor in terms of topology structure, e.g., in terms of peer IDs.
- said physical hardware on which the first node runs is determined by retrieving information from an external management unit linked or associated with the first node.
- said retrieval is performed by the first node.
- said at least one second node which runs on the same physical hardware as the first node is determined by retrieving information from an external management unit linked or associated with the second node.
- said retrieval is performed by the first node.
- the external management unit may also be an external cluster management entity whereby the term "cluster" refers to the P2P overlay network as a cluster of network nodes.
- the external cluster management entity may be a central enrolment server, a bootstrap server, or a network management and monitoring server.
- a manual (pre-)configuration of the nodes by a manager of the nodes is a solution.
- said physical hardware on which the first node runs is determined by retrieving corresponding information from a network operator of the peer-to-peer network and/or from a user of the first node.
- said retrieval is performed by the first node.
- said at least one second node which runs on the same physical hardware as the first node is determined by retrieving corresponding information from a network operator of the peer-to-peer network and/or a user of the at least one second node.
- said retrieval is performed by the first node.
- said physical hardware on which the first node runs is determined by means of a measurement on an application layer associated with the first node.
- said determination is performed by the first node.
- said at least one second node which runs on the same physical hardware as the first node is determined by means of a measurement on an application layer associated with the second node.
- said determination is performed by the first node.
- Said measurement on an application layer may be an application level probing mechanisms such as "ping" message exchanges.
- nodes can estimate from the connection latency if other nodes are hosted on the same device.
- other already known methods can be used to estimate if nodes are on the same hardware: E.g. network co-ordinate systems try to gain knowledge about the underlying network by measuring some inter- node latency without the need of explicit measurements of all links. This allows putting nodes close together in the logical overlay when they are nearby in a physical topology.
- Pastry which adjusts its routing table continuously for locality by measuring the latency to other nodes.
- the first node includes a description of the physical hardware on which the first node runs into a P2P message sent from the first node to the next logical node of the first node, wherein the next logical node stores a replica of the data.
- the next logical node of the first node is defined by the fact that the next logical node stores a replica of the data for which the first node is responsible.
- the next logical node examines whether the physical hardware on which the first node runs is the same as the physical hardware on which the next logical node runs. If the physical hardware on which the first node runs is the same as the physical hardware on which the next logical node runs, the next logical node forwards the replica of the data to the at least one second node.
- ID assignment is a means to prevent that peers on the same hardware are located next to each other with respect to the topology structure of the P2P overlay network. As nodes may fail randomly, two peers that actually were not neighbours may become neighbours at any time. In some deployments a possible solution in that case is to reassign the peer ID. However reassignment of peer IDs is not always possible and in addition might have unwanted effects to the overlay structure. For example, a reassignment of a peer ID can also mean that the key space a peer is responsible for changes: it is likely that the peer becomes responsible for totally different key/value pairs. The required data transfer of an actually integrated peer needs time and resources and might be not acceptable.
- a replication algorithm of the P2P overlay network is expanded.
- the data to be replicated is additionally replicated on the next node that runs on a different hardware and that will become responsible for the data in the case of a hardware failure.
- the replica of data for which the first node is responsible is stored on so many second nodes each of which runs on another physical hardware such that the total number of the second nodes where the replica is stored and each of which second nodes runs on different hardware becomes equal to a pre-defined redundancy factor.
- Fig. 2 shows a P2P overlay network according to an embodiment of the invention
- Fig. 3 shows a redundant data storage in the P2P overlay network shown in Fig. 2 according to an embodiment of the invention.
- Fig. 4 shows a redundant data storage in the P2P overlay network shown in Fig. 2 according to an embodiment of the invention.
- Fig. 2 shows a P2P overlay network according to an embodiment of the invention.
- Fig. 2 illustrates a Chord ring N according to an embodiment of the invention.
- the Chord ring N comprises a plurality of nodes 0, 20, 50, 87, 112, 140, 179, 200, 211 , 223, 240 where the reference signs 0, 20, 50, 87, 112, 140, 179, 200, 211 , 223, 240 are meant to represent also the node IDs of the nodes 0, 20, 50, 87, 112, 140, 179, 200, 211 , 223, 240.
- the node IDs of the nodes are assigned by the overlay specific DHT algorithm and can for example be based on an enrolment server or chosen randomly by the node itself.
- Each node represents a peer of the Chord ring N.
- a first node 211 determines on which physical hardware it is running. And, the first node 211 determines on which physical hardware the other nodes 0, 20, 50, 87, 112, 140, 179, 200, 223, 240 of the Chord ring N are running.
- the first node 211 is composed of one or several inter-linked computers, i.e., a hardware platform, a software platform basing on the hardware platform and several application programs executed by the system platform formed by the software and hardware platform.
- the functionality of the first node 211 is provided by the execution of these application programs.
- the application programs or a selected part of these application programs constitute a computer software product providing a routing service as described in the following, when executed on the system platform. Further, such computer software product is constituted by a storage medium storing these application programs or said selected part of application programs.
- the first node 211 comprises a control unit for control of the functions of the first node, a storage medium for storing data, and an interface for exchange of information with other nodes.
- the first node 211 may use any available information that helps to identify the physical hardware it is running on. It is possible that the first node 211 retrieves information about the physical hardware it is running on by gathering information from its own platform, e.g., a CPU ID, a MAC address, a location, an IP address, etc. Then, the first node 211 may gather corresponding information from the other nodes 0, 20, 50, 87, 112, 140, 179, 200, 223, 240 of the Chord ring N and compare the gathered pieces of information.
- a CPU ID e.g., a CPU ID, a MAC address, a location, an IP address, etc.
- the first node 211 may gather corresponding information from the other nodes 0, 20, 50, 87, 112, 140, 179, 200, 223, 240 of the Chord ring N and compare the gathered pieces of information.
- the first node 211 arrives at the result that the physical hardware the first node 211 is running on is identical to the physical hardware the node 223 is running on.
- the first node 211 may use information retrieved from an external management entity, provided by means of a manual configuration performed by a user of the hardware the first node 211 is running on, gathered by means of application layer measurements, etc.
- each of the other nodes 0, 20, 50, 87, 112, 140, 179, 200, 223, 240 may use any available information that helps to identify the physical hardware it is running on. It is possible that each of the other nodes 0, 20, 50, 87, 112, 140, 179, 200, 223, 240 communicates the gathered information about the respective physical hardware to the first node 211.
- the first node 211 accesses the physical hardware on which the other nodes 0, 20, 50, 87, 112, 140, 179, 200, 223, 240 are running on and collects the pieces of information about their respective physical hardware from the other nodes 0, 20, 50, 87, 112, 140, 179, 200, 223, 240.
- Fig. 2 shows the hardware classification and illustrates this by different icon shapes for the nodes 0, 20, 50, 87, 112, 140, 179, 200, 211 , 223, 240.
- Each shape represents another physical machine. That means that the nodes 0, 50, 140, 211 , and 223 run on a first machine.
- the nodes 20, 112, 179, and 240 run on a second machine.
- the nodes 87 and 200 run on a third machine.
- the replica of the key/value pair 203 that is stored on the node 211 is only replicated on node 223, as is shown in Fig. 1 a.
- an embodiment of the invention provides to additionally or alternatively forward the replicas to the node 240, as nodes 211 and node 223 are hosted on the same hardware.
- Determining the responsible peer 240 is done by the node 211 itself, e.g. by querying its neighbours 223, 240, etc. for their hardware information.
- the node 211 includes its hardware information into a P2P message that is sent to its logical neighbour node 223. Then the node 223 is able to determine that both peers 211 and 223 are hosted on the same physical hardware. In this case, the node 223 forwards the replica 203 from the node 223 to the node 240.
- the node 240 still maintains a copy of the key/value pair 203, thus the data 203 is maintained in the network N.
- a first node has to trigger the storage of the replica on a higher number of peers running on different hardware. For instance, if a redundancy factor of three is requested, the first node 211 has to trigger that the replica data 203 is also stored on the node 87.
- there might be several hardware based levels of redundancy For example, it might be useful to store one replica depending on a different blade, rack, server room or data centre.
- join and leave algorithms according to an embodiment of the invention is modified with regard to the state-of-the-art approaches, in order to ensure consistency of the hardware dependent replicas.
- the procedure where the peers determine on which hardware they are running on has already been completed as described above.
- the JP possibly has influence on the HRP if the join position is between the peer and its HRP.
- each peer has to check if its HRP has changed. If it has changed the HR must be pushed to the peer that is now on the HRP and the old HR must be deleted.
- a LP also possibly influences the HRP if it was between the peer and its HRP or if the LP was on the HRP itself. In this case each peer has to check if its HRP has changed. If it has changed the HR must be pushed to the peer that is now on the HRP and the old HR must be deleted.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Quality & Reliability (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP08290624.9 | 2008-06-27 | ||
EP08290624A EP2139205B1 (en) | 2008-06-27 | 2008-06-27 | Method of redundant data storage |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009156263A1 true WO2009156263A1 (en) | 2009-12-30 |
Family
ID=39884330
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2009/057043 WO2009156263A1 (en) | 2008-06-27 | 2009-06-08 | Method of redundant data storage |
Country Status (4)
Country | Link |
---|---|
US (1) | US8126849B2 (zh) |
EP (1) | EP2139205B1 (zh) |
CN (1) | CN101616184B (zh) |
WO (1) | WO2009156263A1 (zh) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8509407B2 (en) * | 2009-03-23 | 2013-08-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Event identification in peer to peer networks |
CN101895482A (zh) * | 2009-05-18 | 2010-11-24 | 华为技术有限公司 | 对点到点技术网络的逻辑拓扑信息进行抽象的方法和装置 |
US8326798B1 (en) * | 2009-09-14 | 2012-12-04 | Network Appliance, Inc. | File system agnostic replication |
US8874505B2 (en) * | 2011-01-11 | 2014-10-28 | Hitachi, Ltd. | Data replication and failure recovery method for distributed key-value store |
US8782364B2 (en) | 2011-12-13 | 2014-07-15 | Hewlett-Packard Development Company, L.P. | Determining availability of data elements in a storage system |
CN102868682B (zh) * | 2012-08-21 | 2015-02-25 | 北京邮电大学 | 一种流媒体资源共享的方法和装置 |
US9680659B2 (en) * | 2012-08-27 | 2017-06-13 | Ricoh Company, Ltd. | Obtaining, managing and archiving conference data |
CN103034739A (zh) * | 2012-12-29 | 2013-04-10 | 天津南大通用数据技术有限公司 | 一种分布式存储系统及其更新和查询方法 |
WO2014108356A2 (en) * | 2013-01-10 | 2014-07-17 | Telefonaktiebolaget L M Ericsson (Publ) | Connection mechanism for energy-efficient peer-to-peer networks |
US9210219B2 (en) | 2013-07-15 | 2015-12-08 | Red Hat, Inc. | Systems and methods for consistent hashing using multiple hash rings |
US10303567B2 (en) * | 2013-08-15 | 2019-05-28 | Entit Software Llc | Managing database nodes |
EP2953025B1 (en) * | 2013-10-18 | 2017-01-25 | Hitachi Ltd. | Target-driven independent data integrity and redundancy recovery in a shared-nothing distributed storage system |
CN103810061B (zh) * | 2014-01-28 | 2017-05-31 | 河南科技大学 | 一种高可用云存储方法 |
US10412158B2 (en) * | 2016-07-27 | 2019-09-10 | Salesforce.Com, Inc. | Dynamic allocation of stateful nodes for healing and load balancing |
US10698780B2 (en) * | 2016-08-05 | 2020-06-30 | Nutanix, Inc. | Implementing availability domain aware replication policies |
JP7074018B2 (ja) * | 2018-10-22 | 2022-05-24 | 日本電信電話株式会社 | 分散処理システムおよび分散処理方法 |
JP7149313B2 (ja) * | 2020-09-28 | 2022-10-06 | 株式会社日立製作所 | 記憶システム及びその制御方法 |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6073209A (en) * | 1997-03-31 | 2000-06-06 | Ark Research Corporation | Data storage controller providing multiple hosts with access to multiple storage subsystems |
GB0002972D0 (en) * | 2000-02-09 | 2000-03-29 | Orange Personal Comm Serv Ltd | Data handling system |
US20020083163A1 (en) * | 2000-10-26 | 2002-06-27 | Metilinx | Multi-platform optimization model |
US6771666B2 (en) * | 2002-03-15 | 2004-08-03 | Meshnetworks, Inc. | System and method for trans-medium address resolution on an ad-hoc network with at least one highly disconnected medium having multiple access points to other media |
US6937602B2 (en) * | 2001-10-23 | 2005-08-30 | Meshnetworks, Inc. | System and method for providing a congestion optimized address resolution protocol for wireless ad-hoc networks |
US6928476B2 (en) * | 2002-08-23 | 2005-08-09 | Mirra, Inc. | Peer to peer remote data storage and collaboration |
US8005918B2 (en) * | 2002-11-12 | 2011-08-23 | Rateze Remote Mgmt. L.L.C. | Data storage devices having IP capable partitions |
US20050108276A1 (en) * | 2003-11-13 | 2005-05-19 | Ramani Sriram | Methods and system for dynamic database content persistence and information management |
US7904913B2 (en) * | 2004-11-02 | 2011-03-08 | Bakbone Software, Inc. | Management interface for a system that provides automated, real-time, continuous data protection |
US20080130516A1 (en) * | 2004-12-21 | 2008-06-05 | Electronics And Telecommunications Research Institute | P2p Overplay Network Construction Method and Apparatus |
CN1328879C (zh) * | 2005-01-26 | 2007-07-25 | 北京大学 | 基于数据分块冗余和虚拟化存储的在线备份方法 |
US7849303B2 (en) * | 2005-02-22 | 2010-12-07 | Microsoft Corporation | Peer-to-peer network information storage |
US20060190715A1 (en) * | 2005-02-22 | 2006-08-24 | Microsoft Corporation | Peer-to-peer network information retrieval |
US8365301B2 (en) * | 2005-02-22 | 2013-01-29 | Microsoft Corporation | Peer-to-peer network communication |
US7656810B2 (en) * | 2005-03-25 | 2010-02-02 | Microsoft Corporation | System and method for monitoring and reacting to peer-to-peer network metrics |
EP1821487B1 (en) * | 2006-02-21 | 2010-04-07 | Microsoft Corporation | Topology management in peer-to-peer content distribution clouds |
US9047310B2 (en) * | 2006-02-22 | 2015-06-02 | Microsoft Technology Licensing, Llc | Reliable, efficient peer-to-peer storage |
US20070230468A1 (en) * | 2006-03-31 | 2007-10-04 | Matsushita Electric Industrial Co., Ltd. | Method to support mobile devices in a peer-to-peer network |
DE102006024982A1 (de) | 2006-05-29 | 2007-12-13 | Nokia Siemens Networks Gmbh & Co.Kg | Peer-to-Peer-Kommunikationseinrichtung, Verfahren zum Bilden einer Peer-to-Peer-Identifikationsangabe und Verfahren zum Betreiben eines Peer-to-Peer-Kommunikationsnetzwerks |
US8041942B2 (en) * | 2006-09-05 | 2011-10-18 | Panasonic Corporation | Robust peer-to-peer networks and methods of use thereof |
CN101170572A (zh) * | 2006-10-23 | 2008-04-30 | 日电(中国)有限公司 | 基于p2p sip技术实现的多媒体网络通信系统 |
US20080147821A1 (en) * | 2006-12-19 | 2008-06-19 | Dietrich Bradley W | Managed peer-to-peer content backup service system and method using dynamic content dispersal to plural storage nodes |
US8090792B2 (en) * | 2007-03-08 | 2012-01-03 | Nec Laboratories America, Inc. | Method and system for a self managing and scalable grid storage |
US8762664B2 (en) * | 2007-08-30 | 2014-06-24 | Red Hat, Inc. | Replicating cache nodes in a cluster |
-
2008
- 2008-06-27 EP EP08290624A patent/EP2139205B1/en active Active
-
2009
- 2009-06-08 WO PCT/EP2009/057043 patent/WO2009156263A1/en active Application Filing
- 2009-06-09 US US12/457,367 patent/US8126849B2/en active Active
- 2009-06-26 CN CN2009101491955A patent/CN101616184B/zh active Active
Non-Patent Citations (5)
Title |
---|
GISIK KWON ET AL: "BYPASS: topology-aware lookup overlay for dht-based P2P file locating services", PARALLEL AND DISTRIBUTED SYSTEMS, 2004. ICPADS 2004. PROCEEDINGS. TENT H INTERNATIONAL CONFERENCE ON NEWPORT BEACH, CA, USA 7-9 JULY 2004, PISCATAWAY, NJ, USA,IEEE, 7 July 2004 (2004-07-07), pages 297 - 304, XP010710896, ISBN: 978-0-7695-2152-7 * |
ION STOICA ET AL: "Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications", IEEE / ACM TRANSACTIONS ON NETWORKING, IEEE / ACM, NEW YORK, NY, US, vol. 11, no. 1, 1 February 2003 (2003-02-01), XP011077215, ISSN: 1063-6692 * |
KRISTIAN WAAGAN: "Building a Replicated Data Store using Berkeley DB and the Chord DHT", UNDERGRADUATE THESIS, 22 August 2005 (2005-08-22), pages I - 91, XP002504247, Retrieved from the Internet <URL:http://www.diva-portal.org/ntnu/abstract.xsql?dbid=624> [retrieved on 20081011] * |
RIECHE S ET AL: "A thermal-dissipation-based approach for balancing data load in distributed hash tables", COMPUTATIONAL SYSTEMS BIOINFORMATICS CONFERENCE, 2004. CSB 2004. PROCE EDINGS. 2004 IEEE TAMPA, FL, USA 16-18 NOV. 2004, LOS ALAMITOS, CA, USA,IEEE (COMPUT. SOC, US, 16 November 2004 (2004-11-16), pages 15 - 23, XP010753053, ISBN: 978-0-7695-2260-9 * |
SALTER, JAMES; ANTONOPOULUS, NICK: "ROME: Optimising DHT_based Peer-to-Peer Networks", PROCEEDINGS OF THE FIFTHE INTERNATIONAL NETWORK CONFERENCE (INC 2005), 5 July 2005 (2005-07-05) - 7 July 2005 (2005-07-07), Samos Island, Greece, pages 81 - 88, XP000863947, Retrieved from the Internet <URL:http://www.jamessalter.me.uk/personal/publications/pdf/inc2005FINAL.pdf> [retrieved on 20090807] * |
Also Published As
Publication number | Publication date |
---|---|
EP2139205B1 (en) | 2012-10-31 |
CN101616184B (zh) | 2013-08-28 |
CN101616184A (zh) | 2009-12-30 |
EP2139205A1 (en) | 2009-12-30 |
US8126849B2 (en) | 2012-02-28 |
US20090327364A1 (en) | 2009-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8126849B2 (en) | Method of redundant data storage | |
EP2139202B1 (en) | Method of providing a successor list | |
US20090323700A1 (en) | Method of determining a routing path | |
Pourebrahimi et al. | A survey of peer-to-peer networks | |
Wang et al. | Peer-to-peer overlay networks: A survey | |
Locher et al. | equus: A provably robust and locality-aware peer-to-peer system | |
US20110010578A1 (en) | Consistent and fault tolerant distributed hash table (dht) overlay network | |
WO2008003596A1 (en) | Distributed hashing mechanism for self-organizing networks | |
Zöls et al. | On hierarchical DHT systems–An analytical approach for optimal designs | |
JP2013514733A (ja) | ピアツーピア・ネットワーク内でサービスを突き止める方法および装置 | |
Zhang et al. | PeerCast: Churn-resilient end system multicast on heterogeneous overlay networks | |
Bertier et al. | D2ht: The best of both worlds, integrating rps and dht | |
Janson et al. | A self-stabilizing locality-aware peer-to-peer network combining random networks, search trees, and dhts | |
Diane et al. | A hierarchical dht for fault tolerant management in p2p-sip networks | |
Chan et al. | Malugo: A peer-to-peer storage system | |
Antonopoulos et al. | A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2P Networks. | |
Lu et al. | A scalable P2P overlay based on arrangement graph with minimized overhead | |
Dobre | A cluster-enhanced fault tolerant peer-to-peer systems | |
Lu et al. | Design and analysis of arrangement graph-based overlay systems for information sharing | |
Chan et al. | Web 3.0 Chord DHT Resource Clustering | |
Nowlan et al. | Crux: Locality-preserving distributed systems | |
Iancu et al. | A self-adapting peer-to-peer logical infrastructure, to increase storage reliability on top of the physical infrastructure | |
Galluccio et al. | On the efficiency and trustworthiness of DHT-based P2P search algorithms in mobile wireless networks | |
Dobre et al. | DistHash: A robust P2P DHT-based system for replicated objects | |
Aung et al. | A Framework for supporting consistent lookup in Distributed Hash Table |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09769112 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09769112 Country of ref document: EP Kind code of ref document: A1 |